In his last work, "Crisis of the European Sciences and Transcendental Phenomenology", Edmund Husserl formulated a radical ...
اقرأ المزيد
This volume contains the proceedings of the 1st International Workshop on Critical Information Infrastructure Security (CRITIS ...
اقرأ المزيد
This book explores the potential risks and vulnerabilities of the European electricity infrastructure, other infrastructures ...
اقرأ المزيد
This book discusses the most current issues in head and neck cancer with a focus on current trends such as biomarkers, precision ...
اقرأ المزيد
Reviews the state-of-the-art knowledge with emphasis on multidisciplinary decision and management of head and neck cancer. ...
اقرأ المزيد
this book explores the applications of Critical Pedagogy to actual classroom situations. Written in a straight-forward, concise, ...
اقرأ المزيد
In an effort to cut costs and re-focus on their core competences, The author develops a model that comprises 29 critical ...
اقرأ المزيد
This work takes stock of the different conceptions of fundamental value in finance, the methods of its calculation and the ...
اقرأ المزيد
Border regions in Central Europe undergo tremendous changes due to the enlargement of the European Union and the related ...
اقرأ المزيدInvestment platforms are challenging the grip of massive business on the venture sector and are providing new means of power ...
اقرأ المزيد
RSA is a public-key cryptographic system, and is the most famous and widely-used cryptographic system in today's digital ...
اقرأ المزيد
The papers collected in this volume represent cutting-edge world wide research in the rapidly evolving fields of crypto-hardware, ...
اقرأ المزيد
The papers collected in this volume represent cutting-edge world wide research in the rapidly evolving fields of crypto-hardware, ...
اقرأ المزيد
This book constitutes the refereed proceedings of the 10th Interntaional Workshop on Cryptographic Hardware and Embedded ...
اقرأ المزيد
This book presented signatures, boolean functions, block cipher cryptanalysis, side channels, linear complexity, public key ...
اقرأ المزيد
This book presented signatures, boolean functions, block cipher cryptanalysis, side channels, linear complexity, public key ...
اقرأ المزيد
This book constitutes the refereed proceedings of the 5th International Conference on Cryptology and Network Security, CANS ...
اقرأ المزيد
This book constitutes the refereed proceedings of the 7th International Conference on Cryptology and Network Security, CANS ...
اقرأ المزيد
Constitutes a valuable, concise and up-to-date guide for the materials and life science community interested in cellulose ...
اقرأ المزيد
This book explores cultural competence in the higher education sector from multi-disciplinary and inter-disciplinary perspectives. ...
اقرأ المزيد